Abstract is missing.
- Blockchains and Consensus Protocols: Snake Oil WarningChristian Cachin. 1-2 [doi]
- It is a Disruptive World with Exponential Development: Expected Trends in Embedded Systems, with a Special Focus on the Automotive Industry and Its Likely Effects on Industry and SocietyAndreas Eckel. 3-4 [doi]
- Advancing Fault Injection and Dependability Evaluation in the Software-Driven Telecom IndustryRoberto Natella. 5 [doi]
- Data Management and Privacy in a World of Data WealthFrancisco Maia. 6-7 [doi]
- ICT and Data-Management for Dependability of Electricity Distribution Grids: Opportunities and BarriersHans-Peter Schwefel, Walter Schaffer, Robert Damboeck. 8-9 [doi]
- Accurately Simulating the Effects of Faults in VHDL Models Described at the Implementation-LevelIlya Tuzov, Juan Carlos Ruiz, David de Andrés. 10-17 [doi]
- Cluster-Based Vulnerability Assessment Applied to Operating SystemsYazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi. 18-25 [doi]
- Preserving Stabilization While Practically Bounding State SpaceVidhya Tekken Valapil, Sandeep S. Kulkarni. 26-33 [doi]
- Scalable Byzantine Fault Tolerance on Heterogeneous ServersMichael Eischer, Tobias Distler. 34-41 [doi]
- Resilience Analysis of Top K Selection AlgorithmsRyan Slechta, Laura Monroe, Nathan DeBardeleben, Qiang Guan, Joanne Wendelberger, Sarah Michalak. 42-49 [doi]
- Analysis of Adaptive Fault Tolerance for Resilient ComputingWilliam Excoffon, Jean-Charles Fabre, Michaël Lauer. 50-57 [doi]
- Computing the Probability for Data Loss in Two-Dimensional Parity RAIDsLars Nagel, Tim Suess. 58-65 [doi]
- Embedded Multi-core System for Design of Next Generation Powertrain Control UnitsGeorg Macher, Markus Bachinger, Michael Stolz. 66-72 [doi]
- On the Emulation of Vulnerabilities through Software Fault InjectionFrederico Cerveira, Raul Barbosa, Marta Mercier, Henrique Madeira. 73-78 [doi]
- Test Program Generator for AUTOSAR OSKazuto Shigihara, Shinya Honda, Hiroaki Takada. 79-86 [doi]
- Impact of a Fault Management Architecture on the Performance of a Component-Based SystemGhazal Zamani, Olivia Das. 87-94 [doi]
- Using Safety Contracts to Guide the Maintenance of Systems and Safety CasesOmar Tawffeeq Saleem Jaradat, Iain Bate. 95-102 [doi]
- Challenges of Safety Assurance for Industry 4.0Omar Jaradat, Irfan Sljivo, Ibrahim Habli, Richard Hawkins. 103-106 [doi]
- An Approach for Designing Knowledge-Based Systems for High-Integrity ApplicationsLuke J. W. Martin, Alexander Romanovsky. 107-110 [doi]
- Privacy and Data Mining: Evaluating the Impact of Data Anonymization on Classification AlgorithmsHebert de Oliveira Silva, Tânia Basso, Regina Lúcia de Oliveira Moraes. 111-116 [doi]
- SAFETHINGS: Data Security by Design in the IoTManuel Barbosa, Sonia Ben Mokhtar, Pascal Felber, Francisco Maia, Miguel Matos, Rui Oliveira, Etienne Riviere, Valerio Schiavoni, Spyros Voulgaris. 117-120 [doi]
- On Combining Diverse Static Analysis Tools for Web Security: An Empirical StudyPaulo Jorge Costa Nunes, Iberia Medeiros, José Fonseca, Nuno Ferreira Neves, Miguel Correia, Marco Vieira. 121-128 [doi]
- An Analysis of OpenStack VulnerabilitiesIvano Alessandro Elia, Nuno Antunes, Nuno Laranjeiro, Marco Vieira. 129-134 [doi]
- vepRisk - A Web Based Analysis Tool for Public Security DataAmbrose Andongabo, Ilir Gashi. 135-138 [doi]
- Application of Routine Activity Theory to Cyber Intrusion Location and TimeKevin Bock, Sydnee Shannon, Yazdan Movahedi, Michel Cukier. 139-146 [doi]
- Toward an Intrusion Detection Approach for IoT Based on Radio Communications ProfilingJonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche. 147-150 [doi]
- A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed DatabaseLeonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone. 151-154 [doi]